Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (23)

Search Parameters:
Keywords = PHI security

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
20 pages, 2437 KB  
Article
Regression-Based Small Language Models for DER Trust Metric Extraction from Structured and Semi-Structured Data
by Nathan Hamill and Razi Iqbal
Big Data Cogn. Comput. 2026, 10(2), 39; https://doi.org/10.3390/bdcc10020039 - 24 Jan 2026
Viewed by 154
Abstract
Renewable energy sources like wind turbines and solar panels are integrated into modern power grids as Distributed Energy Resources (DERs). These DERs can operate independently or as part of microgrids. Interconnecting multiple microgrids creates Networked Microgrids (NMGs) that increase reliability, resilience, and independent [...] Read more.
Renewable energy sources like wind turbines and solar panels are integrated into modern power grids as Distributed Energy Resources (DERs). These DERs can operate independently or as part of microgrids. Interconnecting multiple microgrids creates Networked Microgrids (NMGs) that increase reliability, resilience, and independent power generation. However, the trustworthiness of individual DERs remains a critical challenge in NMGs, particularly when integrating previously deployed or geographically distributed units managed by entities with varying expertise. Assessing DER trustworthiness ensuring reliability and security is essential to prevent system-wide instability. Thisresearch addresses this challenge by proposing a lightweight trust metric generation system capable of processing structured and semi-structured DER data to produce key trust indicators. The system employs a Small Language Model (SLM) with approximately 16 million parameters for textual data understanding and metric extraction, followed by a regression head to output bounded trust scores. Designed for deployment in computationally constrained environments, the SLM requires only 64.6 MB of disk space and 200–250 MB of memory that is significantly lesser than larger models such as DeepSeek R1, Gemma-2, and Phi-3, which demand 3–12 GB. Experimental results demonstrate that the SLM achieves high correlation and low mean error across all trust metrics while outperforming larger models in efficiency. When integrated into a full neural network-based trust framework, the generated metrics enable accurate prediction of DER trustworthiness. These findings highlight the potential of lightweight SLMs for reliable and resource-efficient trust assessment in NMGs, supporting resilient and sustainable energy systems in smart cities. Full article
Show Figures

Figure 1

32 pages, 7383 KB  
Article
Vertebra Segmentation and Cobb Angle Calculation Platform for Scoliosis Diagnosis Using Deep Learning: SpineCheck
by İrfan Harun İlkhan, Halûk Gümüşkaya and Firdevs Turgut
Informatics 2025, 12(4), 140; https://doi.org/10.3390/informatics12040140 - 11 Dec 2025
Viewed by 1161
Abstract
This study presents SpineCheck, a fully integrated deep-learning-based clinical decision support platform for automatic vertebra segmentation and Cobb angle (CA) measurement from scoliosis X-ray images. The system unifies end-to-end preprocessing, U-Net-based segmentation, geometry-driven angle computation, and a web-based clinical interface within a single [...] Read more.
This study presents SpineCheck, a fully integrated deep-learning-based clinical decision support platform for automatic vertebra segmentation and Cobb angle (CA) measurement from scoliosis X-ray images. The system unifies end-to-end preprocessing, U-Net-based segmentation, geometry-driven angle computation, and a web-based clinical interface within a single deployable architecture. For secure clinical use, SpineCheck adopts a stateless “process-and-delete” design, ensuring that no radiographic data or Protected Health Information (PHI) are permanently stored. Five U-Net family models (U-Net, optimized U-Net-2, Attention U-Net, nnU-Net, and UNet3++) are systematically evaluated under identical conditions using Dice similarity, inference speed, GPU memory usage, and deployment stability, enabling deployment-oriented model selection. A robust CA estimation pipeline is developed by combining minimum-area rectangle analysis with Theil–Sen regression and spline-based anatomical modeling to suppress outliers and improve numerical stability. The system is validated on a large-scale dataset of 20,000 scoliosis X-ray images, demonstrating strong agreement with expert measurements based on Mean Absolute Error, Pearson correlation, and Intraclass Correlation Coefficient metrics. These findings confirm the reliability and clinical robustness of SpineCheck. By integrating large-scale validation, robust geometric modeling, secure stateless processing, and real-time deployment capabilities, SpineCheck provides a scalable and clinically reliable framework for automated scoliosis assessment. Full article
Show Figures

Figure 1

18 pages, 2060 KB  
Article
A Context-Aware Representation-Learning-Based Model for Detecting Human-Written and AI-Generated Cryptocurrency Tweets Across Large Language Models
by Muhammad Asad Arshed, Ştefan Cristian Gherghina, Iqra Khalil, Hasnain Muavia, Anum Saleem and Hajran Saleem
Math. Comput. Appl. 2025, 30(6), 130; https://doi.org/10.3390/mca30060130 - 29 Nov 2025
Viewed by 831
Abstract
The extensive use of large language models (LLMs), particularly in the finance sector, raises concerns about the authenticity and reliability of generated text. Developing a robust method for distinguishing between human-written and AI-generated financial content is therefore essential. This study addressed this challenge [...] Read more.
The extensive use of large language models (LLMs), particularly in the finance sector, raises concerns about the authenticity and reliability of generated text. Developing a robust method for distinguishing between human-written and AI-generated financial content is therefore essential. This study addressed this challenge by constructing a dataset based on financial tweets, where original financial tweet texts were regenerated using six LLMs, resulting in seven distinct classes: human-authored text, LLaMA3.2, Phi3.5, Gemma2, Qwen2.5, Mistral, and LLaVA. A context-aware representation-learning-based model, namely DeBERTa, was extensively fine-tuned for this task. Its performance was compared to that of other transformer variants (DistilBERT, BERT Base Uncased, ELECTRA, and ALBERT Base V1) as well as traditional machine learning models (logistic regression, naive Bayes, random forest, decision trees, XGBoost, AdaBoost, and voting (AdaBoost, GradientBoosting, XGBoost)) using Word2Vec embeddings. The proposed DeBERTa-based model achieved an impressive test accuracy, precision, recall, and F1-score, all reaching 94%. In contrast, competing transformer models achieved test accuracies ranging from 0.78 to 0.80, while traditional machine learning models yielded a significantly lower performance (0.39–0.80). These results highlight the effectiveness of context-aware representation learning in distinguishing between human-written and AI-generated financial text, with significant implications for text authentication, authorship verification, and financial information security. Full article
Show Figures

Figure 1

20 pages, 5391 KB  
Article
EmbryoTrust: A Blockchain-Based Framework for Trustworthy, Secure, and Ethical In Vitro Fertilization Data Management and Fertility Preservation
by Hessah A. Alsalamah, Shaden F. Al-Qahtani, Ghazlan Al-Arifi, Jana Al-Sadhan, Reema Al-Mutairi, Nahla Bakhamis, Fady I. Sharara and Shada AlSalamah
Electronics 2025, 14(23), 4648; https://doi.org/10.3390/electronics14234648 - 26 Nov 2025
Viewed by 553
Abstract
Assisted Reproductive Technology (ART), particularly In Vitro Fertilization (IVF), generates highly sensitive medical data classified as Protected Health Information (PHI) under international privacy and data protection laws. Ensuring the secure, transparent, and ethically governed management of this data is both essential and legally [...] Read more.
Assisted Reproductive Technology (ART), particularly In Vitro Fertilization (IVF), generates highly sensitive medical data classified as Protected Health Information (PHI) under international privacy and data protection laws. Ensuring the secure, transparent, and ethically governed management of this data is both essential and legally mandated. However, conventional Electronic Medical Record (EMR) systems often present significant challenges, including data-integrity risks, unauthorized access, and limited patient control—issues that become especially critical in contexts such as fertility preservation for cancer patients. EmbryoTrust introduces a blockchain-based framework designed to ensure the confidentiality, integrity, and availability of IVF-related information through a private, permissioned network integrated with role-based access control (RBAC). Smart contracts, implemented in Solidity on the Ethereum platform, verify spousal identities and enforce data immutability in compliance with religious legislation and ethical regulations. Off-chain data are stored in MongoDB for scalable, privacy-preserving management, while on-chain summaries provide tamper-evident traceability and verifiable auditability. The system was deployed and validated on the Ethereum Holešky testnet using Solidity 0.8.21 and Node.js 18.17, achieving an average transaction-confirmation time of 2.8 s, 99.9% uptime and a 95% user-satisfaction rate. Functional, integration, and usability testing confirmed secure and efficient data handling with minimal computational overhead. Comparative analysis demonstrated that the hybrid on-/off-chain architecture reduces latency and gas costs while maintaining automated compliance enforcement. The modular design enables adaptation to other jurisdictions by reconfiguring ethical and regulatory parameters within the smart-contract layer, ensuring flexibility for global deployment. Overall, the EmbryoTrust framework illustrates how blockchain logic can technically enforce medical and ethical rules in real time, providing a reproducible model for secure, culturally compliant, and privacy-preserving digital-health information management. Its alignment with Saudi Vision 2030 and the Wold Health Organization (WHO) Global Strategy on Digital Health 2020–2025 highlights its potential as a scalable solution for next-generation ART information systems. Full article
Show Figures

Figure 1

39 pages, 2251 KB  
Article
Real-Time Phishing Detection for Brand Protection Using Temporal Convolutional Network-Driven URL Sequence Modeling
by Marie-Laure E. Alorvor and Sajjad Dadkhah
Electronics 2025, 14(18), 3746; https://doi.org/10.3390/electronics14183746 - 22 Sep 2025
Cited by 1 | Viewed by 1912
Abstract
Phishing, especially brand impersonation attacks, is a critical cybersecurity threat that harms user trust and organization security. This paper establishes a lightweight model for real-time detection that relies on URL-only sequences, addressing limitations for multimodal methods that leverage HTML, images, or metadata. This [...] Read more.
Phishing, especially brand impersonation attacks, is a critical cybersecurity threat that harms user trust and organization security. This paper establishes a lightweight model for real-time detection that relies on URL-only sequences, addressing limitations for multimodal methods that leverage HTML, images, or metadata. This approach is based on a Temporal Convolutional Network with Attention (TCNWithAttention) that utilizes character-level URLs to capture both local and long-range dependencies, while providing interpretability with attention visualization and Shapley additive explanations (SHAP). The model was trained and tested on the balanced GramBeddings dataset (800,000 URLs) and validated on the PhiUSIIL dataset of real-world phishing URLs. The model achieved 97.54% accuracy on the GramBeddings dataset, and 81% recall on the PhiUSIIL dataset. The model demonstrated strong generalization, fast inference, and CPU-only deployability. It outperformed CNN, BiLSTM and BERT baselines. Explanations highlighted phishing indicators, such as deceptive subdomains, brand impersonation, and suspicious tokens. It also affirmed real patterns in the legitimate domains. To our knowledge, a Streamlit application to facilitate single and batch URL analysis and log feedback to maintain usability is the first phishing detection framework to integrate TCN, attention, and SHAP, bridging academic innovation with practical cybersecurity techniques. Full article
(This article belongs to the Special Issue Emerging Technologies for Network Security and Anomaly Detection)
Show Figures

Figure 1

13 pages, 1492 KB  
Article
SecureTeleMed: Privacy-Preserving Volumetric Video Streaming for Telemedicine
by Kaiyuan Hu, Deen Ma and Shi Qiu
Electronics 2025, 14(17), 3371; https://doi.org/10.3390/electronics14173371 - 25 Aug 2025
Cited by 1 | Viewed by 906
Abstract
Volumetric video streaming holds transformative potential for telemedicine, enabling immersive remote consultations, surgical training, and real-time collaborative diagnostics. However, transmitting sensitive patient data (e.g., 3D medical scans, surgeon head/gaze movements) raises critical privacy risks, including exposure of biometric identifiers and protected health information [...] Read more.
Volumetric video streaming holds transformative potential for telemedicine, enabling immersive remote consultations, surgical training, and real-time collaborative diagnostics. However, transmitting sensitive patient data (e.g., 3D medical scans, surgeon head/gaze movements) raises critical privacy risks, including exposure of biometric identifiers and protected health information (PHI). To address the above concerns, we propose SecureTeleMed, a dual-track encryption scheme tailored for volumetric video based telemedicine. SecureTeleMed combines viewport obfuscation and region of interest (ROI)-aware frame encryption to protect both patient data and clinician interactions while complying with healthcare privacy regulations (e.g., HIPAA, GDPR). Evaluations show SecureTeleMed reduces privacy leakage by 89% compared to baseline encryption methods, with sub-50 ms latency suitable for real-time telemedicine applications. Full article
(This article belongs to the Special Issue Big Data Security and Privacy)
Show Figures

Figure 1

24 pages, 654 KB  
Article
Deep Learning Framework for Advanced De-Identification of Protected Health Information
by Ahmad Aloqaily, Emad E. Abdallah, Rahaf Al-Zyoud, Esraa Abu Elsoud, Malak Al-Hassan and Alaa E. Abdallah
Future Internet 2025, 17(1), 47; https://doi.org/10.3390/fi17010047 - 20 Jan 2025
Cited by 7 | Viewed by 3181
Abstract
Electronic health records (EHRs) are widely used in healthcare institutions worldwide, containing vast amounts of unstructured textual data. However, the sensitive nature of Protected Health Information (PHI) embedded within these records presents significant privacy challenges, necessitating robust de-identification techniques. This paper introduces a [...] Read more.
Electronic health records (EHRs) are widely used in healthcare institutions worldwide, containing vast amounts of unstructured textual data. However, the sensitive nature of Protected Health Information (PHI) embedded within these records presents significant privacy challenges, necessitating robust de-identification techniques. This paper introduces a novel approach, leveraging a Bi-LSTM-CRF model to achieve accurate and reliable PHI de-identification, using the i2b2 dataset sourced from Harvard University. Unlike prior studies that often unify Bi-LSTM and CRF layers, our approach focuses on the individual design, optimization, and hyperparameter tuning of both the Bi-LSTM and CRF components, allowing for precise model performance improvements. This rigorous approach to architectural design and hyperparameter tuning, often underexplored in the existing literature, significantly enhances the model’s capacity for accurate PHI tag detection while preserving the essential clinical context. Comprehensive evaluations are conducted across 23 PHI categories, as defined by HIPAA, ensuring thorough security across critical domains. The optimized model achieves exceptional performance metrics, with a precision of 99%, recall of 98%, and F1-score of 98%, underscoring its effectiveness in balancing recall and precision. By enabling the de-identification of medical records, this research strengthens patient confidentiality, promotes compliance with privacy regulations, and facilitates safe data sharing for research and analysis. Full article
(This article belongs to the Special Issue eHealth and mHealth)
Show Figures

Figure 1

25 pages, 39533 KB  
Article
Identification of High-Photosynthetic-Efficiency Wheat Varieties Based on Multi-Source Remote Sensing from UAVs
by Weiyi Feng, Yubin Lan, Hongjian Zhao, Zhicheng Tang, Wenyu Peng, Hailong Che and Junke Zhu
Agronomy 2024, 14(10), 2389; https://doi.org/10.3390/agronomy14102389 - 16 Oct 2024
Cited by 6 | Viewed by 1891
Abstract
Breeding high-photosynthetic-efficiency wheat varieties is a crucial link in safeguarding national food security. Traditional identification methods necessitate laborious on-site observation and measurement, consuming time and effort. Leveraging unmanned aerial vehicle (UAV) remote sensing technology to forecast photosynthetic indices opens up the potential for [...] Read more.
Breeding high-photosynthetic-efficiency wheat varieties is a crucial link in safeguarding national food security. Traditional identification methods necessitate laborious on-site observation and measurement, consuming time and effort. Leveraging unmanned aerial vehicle (UAV) remote sensing technology to forecast photosynthetic indices opens up the potential for swiftly discerning high-photosynthetic-efficiency wheat varieties. The objective of this research is to develop a multi-stage predictive model encompassing nine photosynthetic indicators at the field scale for wheat breeding. These indices include soil and plant analyzer development (SPAD), leaf area index (LAI), net photosynthetic rate (Pn), transpiration rate (Tr), intercellular CO2 concentration (Ci), stomatal conductance (Gsw), photochemical quantum efficiency (PhiPS2), PSII reaction center excitation energy capture efficiency (Fv’/Fm’), and photochemical quenching coefficient (qP). The ultimate goal is to differentiate high-photosynthetic-efficiency wheat varieties through model-based predictions. This research gathered red, green, and blue spectrum (RGB) and multispectral (MS) images of eleven wheat varieties at the stages of jointing, heading, flowering, and filling. Vegetation indices (VIs) and texture features (TFs) were extracted as input variables. Three machine learning regression models (Support Vector Machine Regression (SVR), Random Forest (RF), and BP Neural Network (BPNN)) were employed to construct predictive models for nine photosynthetic indices across multiple growth stages. Furthermore, the research conducted principal component analysis (PCA) and membership function analysis on the predicted values of the optimal models for each indicator, established a comprehensive evaluation index for high photosynthetic efficiency, and employed cluster analysis to screen the test materials. The cluster analysis categorized the eleven varieties into three groups, with SH06144 and Yannong 188 demonstrating higher photosynthetic efficiency. The moderately efficient group comprises Liangxing 19, SH05604, SH06085, Chaomai 777, SH05292, Jimai 22, and Guigu 820, totaling seven varieties. Xinmai 916 and Jinong 114 fall into the category of lower photosynthetic efficiency, aligning closely with the results of the clustering analysis based on actual measurements. The findings suggest that employing UAV-based multi-source remote sensing technology to identify wheat varieties with high photosynthetic efficiency is feasible. The study results provide a theoretical basis for winter wheat phenotypic monitoring at the breeding field scale using UAV-based multi-source remote sensing, offering valuable insights for the advancement of smart breeding practices for high-photosynthetic-efficiency wheat varieties. Full article
(This article belongs to the Section Precision and Digital Agriculture)
Show Figures

Figure 1

11 pages, 1035 KB  
Article
Assessing Medical Student Lifestyle Medicine Skills Using an Objective Structured Clinical Examination
by Denise Kay, Magdalena Pasarica, Caridad A. Hernandez, Analia Castiglioni, Christine A. Kauffman, Feroza Daroowalla and Saleh M. M. Rahman
Int. Med. Educ. 2024, 3(3), 363-373; https://doi.org/10.3390/ime3030027 - 22 Sep 2024
Cited by 1 | Viewed by 1793
Abstract
(1) The purpose of this project was to create and collect validity evidence for a lifestyle medicine objective structured clinical examination (OSCE) station to assess medical students’ performance related to lifestyle medicine competencies. (2) We developed a lifestyle medicine case/station with an associated [...] Read more.
(1) The purpose of this project was to create and collect validity evidence for a lifestyle medicine objective structured clinical examination (OSCE) station to assess medical students’ performance related to lifestyle medicine competencies. (2) We developed a lifestyle medicine case/station with an associated observation checklist and rubric. We piloted the checklist and rubric in one lifestyle medicine OSCE station, securing triplicate scores of each student’s performance. For analysis, generalizability (G) theory was utilized for observation checklist data and interclass correlation coefficients (ICC) for patient encounter notes (PENs). (3) One hundred and fifteen third-year medical students completed the lifestyle medicine OSCE station in the Internal and Family Medicine Clerkship. The generalizability coefficient and Phi-coefficient based on the number of encounters (P = 115), facet 1 (nfacet1 = 10 assessment tool checklist items), and facet 2 (nfacet2 = two performance ratings in the live examination) were 0.71 and 0.69, respectively. The average interclass correlation coefficient (ICC) measure for PEN was 0.79 (CI = 0.69–0.85). (4) For this OSCE station, the G-coefficient provides positive indicators for the validity of the observation checklist items. Similarly, the ICC result provides validity evidence for the usefulness of the PEN rubric for capturing lifestyle medicine knowledge reflected in students’ PEN notes. Full article
Show Figures

Figure 1

17 pages, 15276 KB  
Article
Multichannel Classifier for Recognizing Acoustic Impacts Recorded with a phi-OTDR
by Ivan Alekseevich Barantsov, Alexey Borisovich Pnev, Kirill Igorevich Koshelev, Egor Olegovich Garin, Nickolai Olegovich Pozhar and Roman Igorevich Khan
Sensors 2023, 23(14), 6402; https://doi.org/10.3390/s23146402 - 14 Jul 2023
Cited by 3 | Viewed by 1961
Abstract
The purpose of this work is to increase the security of the perimeter of an area from unauthorized intrusions by creating an improved algorithm for classifying acoustic impacts recorded with a sensor system based on a phase-sensitive optical time reflectometer (phi-OTDR). The algorithm [...] Read more.
The purpose of this work is to increase the security of the perimeter of an area from unauthorized intrusions by creating an improved algorithm for classifying acoustic impacts recorded with a sensor system based on a phase-sensitive optical time reflectometer (phi-OTDR). The algorithm includes machine learning, so a dataset consisting of two classes was assembled. The dataset consists of two classes. The first class is the data of the steps, and the second class is other non-stepping influences (engine noise, a passing car, a passing cyclist, etc.). As an intrusion signal, a human walking signal is analyzed and recorded in frames of 5 s, which passed the threshold condition. Since, in most cases, the intruder moves on foot to overcome the perimeter, the analysis of the acoustic effects generated during the step will increase the efficiency of the perimeter detection tools. When walking quietly, step signals can be quite weak, and background signals can contain high energy and visually resemble the signals you are looking for. Therefore, an algorithm was created that processes space–time diagrams developed in real time, which are grayscale images. At the same time, during the processing of one image, two more images are calculated, which are the result of processing the denoised autoencoder and the created mathematical model of the adaptive correlation. Then, the three obtained images are fed to the input of the created three-channel neural network classifier, which includes convolutional layers for the automatic extraction of spatial features. The probability of correctly detecting steps is 98.3% and that of background actions is 97.93%. Full article
(This article belongs to the Special Issue Advances in Distributed Optical Fiber Sensing Systems)
Show Figures

Figure 1

12 pages, 506 KB  
Article
Some Properties of the Computation of the Modular Inverse with Applications in Cryptography
by Michele Bufalo, Daniele Bufalo and Giuseppe Orlando
Computation 2023, 11(4), 70; https://doi.org/10.3390/computation11040070 - 27 Mar 2023
Cited by 3 | Viewed by 4291
Abstract
In the field of cryptography, many algorithms rely on the computation of modular multiplicative inverses to ensure the security of their systems. In this study, we build upon our previous research by introducing a novel sequence, (zj)j0 [...] Read more.
In the field of cryptography, many algorithms rely on the computation of modular multiplicative inverses to ensure the security of their systems. In this study, we build upon our previous research by introducing a novel sequence, (zj)j0, that can calculate the modular inverse of a given pair of integers (a,n), i.e., a1;mod,n. The computational complexity of this approach is O(a), which is more efficient than the traditional Euler’s phi function method, O(n,ln,n). Furthermore, we investigate the properties of the sequence (zj)j0 and demonstrate that all solutions of the problem belong to a specific set, I, that only contains the minimum values of (zj)j0. This results in a reduction of the computational complexity of our method, especially when an and it also opens new opportunities for discovering closed-form solutions for the modular inverse. Full article
(This article belongs to the Section Computational Engineering)
Show Figures

Figure 1

24 pages, 1082 KB  
Article
Chidroid: A Mobile Android Application for Log Collection and Security Analysis in Healthcare and IoMT
by Stylianos Karagiannis, Luís Landeiro Ribeiro, Christoforos Ntantogian, Emmanouil Magkos and Luís Miguel Campos
Appl. Sci. 2023, 13(5), 3061; https://doi.org/10.3390/app13053061 - 27 Feb 2023
Cited by 12 | Viewed by 5817
Abstract
The Internet of Medical Things (IoMT) is a growing trend that has led to the use of connected devices, known as the Internet of Health. The healthcare domain has been a target of cyberattacks, especially with a large number of IoMT devices connected [...] Read more.
The Internet of Medical Things (IoMT) is a growing trend that has led to the use of connected devices, known as the Internet of Health. The healthcare domain has been a target of cyberattacks, especially with a large number of IoMT devices connected to hospital networks. This factor could allow attackers to access patients’ personal health information (PHI). This research paper proposes Chidroid, an innovative mobile Android application that can retrieve, collect, and distribute logs from smart healthcare devices. The proposed approach enables the creation of datasets, allowing non-structured data to be parsed into semi-structured or structured data that can be used for machine learning and deep learning, and the proposed approach can serve as a universal policy-based tool to examine and analyse security issues in most recent Android versions by distributing logs for analysis. The validation tests demonstrated that the application could retrieve logs and system metrics from various assets and devices in an efficient manner. The collected logs can provide visibility into the device’s activities and help to detect and mitigate potential security risks. This research introduces a way to perform a security analysis on Android devices that uses minimal system resources and reduces battery consumption by pushing the analysis stage to the edge. Full article
(This article belongs to the Special Issue eHealth Innovative Approaches and Applications)
Show Figures

Graphical abstract

20 pages, 2339 KB  
Article
GDPR Compliant Data Storage and Sharing in Smart Healthcare System: A Blockchain-Based Solution
by Pinky Bai, Sushil Kumar, Kirshna Kumar, Omprakash Kaiwartya, Mufti Mahmud and Jaime Lloret
Electronics 2022, 11(20), 3311; https://doi.org/10.3390/electronics11203311 - 14 Oct 2022
Cited by 20 | Viewed by 5030
Abstract
Smart healthcare systems provide user-centric medical services to patients based on collected information of patients inducing personal health information (PHI) and personal identifiable information (PII). The information (PII and PHI) flows into the smart healthcare system with or without any regulation and patient [...] Read more.
Smart healthcare systems provide user-centric medical services to patients based on collected information of patients inducing personal health information (PHI) and personal identifiable information (PII). The information (PII and PHI) flows into the smart healthcare system with or without any regulation and patient concern with the help of new information and communication technologies (ICT). The use of ICT comes with the security and privacy issues of collected PII and PHI data. The Europe Union has published the General Data Protection Regulation (GDPR) to regulate the flow of personal information. Towards this end, this paper proposes a blockchain-based data storage and sharing framework for a smart healthcare system that complies with the “Privacy by Design” rule of the GDPR. The personal information collected from patients is stored on off-chain storage (IPFS), and other information is stored on the blockchain ledger, which is visible to all participants. The smart contracts are designed to share the PII data with another participant based on prior permission of the data owner. The proposed framework also includes the deletion of PII and PHI in the system as per the “Right to be Forgotten” GDPR rule. Security and privacy analyses are performed for the framework to demonstrate the security and privacy of data while sharing and at rest. The comparative performance analysis demonstrates the benefit of the proposed GDPR-compliant data storage and sharing framework using blockchain. It is evident from the reported results that the proposed framework outperforms the state-of-the-art techniques in terms of performance metrics in a smart healthcare system. Full article
Show Figures

Figure 1

12 pages, 305 KB  
Article
Cryptanalysis of RSA-Variant Cryptosystem Generated by Potential Rogue CA Methodology
by Zahari Mahad, Muhammad Rezal Kamel Ariffin, Amir Hamzah Abd. Ghafar and Nur Raidah Salim
Symmetry 2022, 14(8), 1498; https://doi.org/10.3390/sym14081498 - 22 Jul 2022
Cited by 4 | Viewed by 1968
Abstract
Rogue certificate authorities (RCA) are third-party entities that intentionally produce key pairs that satisfy publicly known security requirements but contain weaknesses only known to the RCA. This work analyses the Murru–Saettone RSA variant scheme that obtains its key pair from a potential RCA [...] Read more.
Rogue certificate authorities (RCA) are third-party entities that intentionally produce key pairs that satisfy publicly known security requirements but contain weaknesses only known to the RCA. This work analyses the Murru–Saettone RSA variant scheme that obtains its key pair from a potential RCA methodology. The Murru–Saettone scheme is based on the cubic Pell equation x3+ry3+r2z33rxyz=1. The public, e, and private, d key generation process uses the secret parameter ψ=(p2+p+1)(q2+q+1) in place of the standard Euler–phi function ϕ(N)=(p1)(q1), where ed1(modψ). We prove that, upon obtaining an approximation of ψ, we are able to identify the provided key pair that was maliciously provided even if the private key d size is approximate to ψ. In fact, we are able to factor the modulus N=pq. Full article
19 pages, 539 KB  
Article
A Novel Homomorphic Approach for Preserving Privacy of Patient Data in Telemedicine
by Yasir Iqbal, Shahzaib Tahir, Hasan Tahir, Fawad Khan, Saqib Saeed, Abdullah M. Almuhaideb and Adeel M. Syed
Sensors 2022, 22(12), 4432; https://doi.org/10.3390/s22124432 - 11 Jun 2022
Cited by 19 | Viewed by 5802
Abstract
Globally, the surge in disease and urgency in maintaining social distancing has reawakened the use of telemedicine/telehealth. Amid the global health crisis, the world adopted the culture of online consultancy. Thus, there is a need to revamp the conventional model of the telemedicine [...] Read more.
Globally, the surge in disease and urgency in maintaining social distancing has reawakened the use of telemedicine/telehealth. Amid the global health crisis, the world adopted the culture of online consultancy. Thus, there is a need to revamp the conventional model of the telemedicine system as per the current challenges and requirements. Security and privacy of data are main aspects to be considered in this era. Data-driven organizations also require compliance with regulatory bodies, such as HIPAA, PHI, and GDPR. These regulatory compliance bodies must ensure user data privacy by implementing necessary security measures. Patients and doctors are now connected to the cloud to access medical records, e.g., voice recordings of clinical sessions. Voice data reside in the cloud and can be compromised. While searching voice data, a patient’s critical data can be leaked, exposed to cloud service providers, and spoofed by hackers. Secure, searchable encryption is a requirement for telemedicine systems for secure voice and phoneme searching. This research proposes the secure searching of phonemes from audio recordings using fully homomorphic encryption over the cloud. It utilizes IBM’s homomorphic encryption library (HElib) and achieves indistinguishability. Testing and implementation were done on audio datasets of different sizes while varying the security parameters. The analysis includes a thorough security analysis along with leakage profiling. The proposed scheme achieved higher levels of security and privacy, especially when the security parameters increased. However, in use cases where higher levels of security were not desirous, one may rely on a reduction in the security parameters. Full article
(This article belongs to the Special Issue Security and Privacy for Machine Learning Applications)
Show Figures

Figure 1

Back to TopTop